5/ The attacker was able to access and decrypt a number of these keys, some of which were used to sign the unauthorized transactions. Stolen assets include BUSD, USDC, ETH, and WBTC.
5/攻击者能够访问和解密这些密钥,其中一些密钥用于签署未经授权的交易。被盗资产包括BUSD、USDC、ETH和WBTC。
5/ The attacker was able to access and decrypt a number of these keys, some of which were used to sign the unauthorized transactions. Stolen assets include BUSD, USDC, ETH, and WBTC.
5/攻击者能够访问和解密这些密钥,其中一些密钥用于签署未经授权的交易。被盗资产包括BUSD、USDC、ETH和WBTC。